Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe
Resource
win10v2004-20220901-en
General
-
Target
54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe
-
Size
548KB
-
MD5
07f350fc82c902bc86a47b26cd3fbff0
-
SHA1
0a67832785a42fbc4daa2facaeab85999619e8aa
-
SHA256
54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f
-
SHA512
8f0d0f9176b456b916545463d62d6e65f4559a1152adec6fca2d65d25ccef31c011ab30056fed27b3e6b1de71729b6cafd0abcd9c335300ae734549db621645f
-
SSDEEP
12288:X0bun/W34ZZJ1cjCT3bgO16bYzdUTOokFSH/UjwjWOXsSMc0cacy+:X0bbvjiJ1n5loxUNSMc0Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1940 2X8HVZ.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1960 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1940 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 27 PID 1824 wrote to memory of 1940 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 27 PID 1824 wrote to memory of 1940 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 27 PID 1824 wrote to memory of 1940 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 27 PID 1824 wrote to memory of 1960 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 28 PID 1824 wrote to memory of 1960 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 28 PID 1824 wrote to memory of 1960 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 28 PID 1824 wrote to memory of 1960 1824 54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe"C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe"C:\Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe" -launcher2⤵
- Executes dropped EXE
PID:1940
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe--.docx"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe--.docx
Filesize296KB
MD5252fb563a316229eb0cff9bc58b48c79
SHA12150f4903481cb3e7ead0d655ad477dd2d0dd53b
SHA2562480d3f7583da57538eab32b3e2c9f155d7d2bb05662af48caab2405a43dd8ff
SHA51237a219648635216dd1e25c668e00c3d323454872510d037df87aa6c3acc0fca50efa969a21118185cef366887031ca3fcc6f34c3bdd2b00ecb89e6341611198c
-
Filesize
227KB
MD52a6e093535f97571ad659d6639dfd51f
SHA123a661afa9db77e9c9051ba83633f4082f591f10
SHA25642e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3
SHA512740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6
-
Filesize
227KB
MD52a6e093535f97571ad659d6639dfd51f
SHA123a661afa9db77e9c9051ba83633f4082f591f10
SHA25642e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3
SHA512740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6
-
Filesize
227KB
MD52a6e093535f97571ad659d6639dfd51f
SHA123a661afa9db77e9c9051ba83633f4082f591f10
SHA25642e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3
SHA512740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6
-
Filesize
227KB
MD52a6e093535f97571ad659d6639dfd51f
SHA123a661afa9db77e9c9051ba83633f4082f591f10
SHA25642e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3
SHA512740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6